Should Developers Write Secure Code?

•Should Developers focus on business functionality at the cost of security?
•How much of an application is actually written by your Developers?
•How do you secure your application if you can't guarantee the security of the code?

Join this panel discussion if you:
•Are responsible for the Security of your Enterprise Applications
•Struggle with the challenge of delivering business code fast
•Want to understand new protections in Application Security

This case study examines how a major NHS organiation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

Join this webinar presentation to learn:
- Key lessons on the value of micro-marketing
- Lessons from cybernetics
- The value of cyber resilience in healthcare

About the Presenter:
Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.

Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

Join this webinar to learn the GDPR requirements for managing personal information and digital identity.

The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.

In the age of breaches and increased cyber attacks, security professionals are looking for the best ways to secure their organizations and prepare against upcoming cyber threats. Join this panel of experts are they look back the biggest events of 2017 and provide their recommendations for CISO's on what to look out for in the next months and how to improve their organization's cyber security in 2018.

- Breaches and (Compromised) Identity
- Lessons learned from 2017's major breaches (Equifax, Uber, etc.)
- Fighting cyber fraud, identity theft, account takeovers
- The likelihood of GDPR leading to companies not disclosing breaches
- Cyber attack trends on the horizon
- How to protect against these attacks and build a more resilient enterprise

Aligning security with business goals remains a challenge for CISOs across industries. In an age of relentless attacks, CISOs need to be proactive, informed and have the resources to launch a resilient cyber defense.

Tune in to this interactive panel discussion to learn the key cyber priorities for CISOs this year:
- Cyber attacks and new threats on the horizon
- Understanding your company's cyber risk
- Cost of breaches
- Best practices for improving security in 2018
- Communicating security strategy to the board

In this presentation, Ron Temske, Vice President of Security for Logicalis US, will discuss the prevalence of cyberattacks through a variety of attack vectors.

Attendees will also learn about market trends, malware evolution and smarter security strategies to reduce enterprise vulnerability and mitigate risks.

About the Presenter
Ron Temske is Vice President of Security Solutions for Logicalis US, an international IT solutions and managed services provider (www.us.logicalis.com). At Logicalis, he is responsible for defining the strategic vision for security solutions and ensuring that consistent methodologies and procedures are applied nationwide. Ron has more than 20 years of experience in the information technology-consulting arena and blends sales and management skills with his training as an engineer. Ron holds Bachelor’s and Master’s degrees in Nuclear Engineering from the University of Michigan at Ann Arbor.

Last year's massive cyber attacks and data breaches that disrupted organizations and governments worldwide are a major wake up call for CISO's everywhere. Now, more than ever, it's paramount to make invest in smarter security to protect your organizations critical data assets and workloads.

Join this panel of top industry experts as they discuss:
- Why businesses should put cybersecurity a key priority in 2018
- Key factors to consider when crafting your security strategy
- How to prevent breaches, detect them faster and launch an appropriate response
- Recommendations for CISO's and CIO's

In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals in the real world, this talk focuses on effects based planning that integrates disparate elements of IT and security into a cohesive package. Defending the network is about more than technology. Analysis and leadership are critical elements of an effective cyber defense. You will leave this webinar better equipped to develop the tactics that make strategy a reality.

About the Presenter:
Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.

Join this interactive webinar to learn more about:
- The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
- Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

About the Presenter:
Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.

With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

This interactive Q&A panel with security industry experts will explore:
- The biggest threats on the horizon
- Key vulnerabilities and how to protect against them
- Measures for breach prevention, detection and response
- Which areas to focus on in 2018
- Recommendations for CISOs

In 2016, there were 329 breaches involving 500+ records, amassing a total of 16,471,765 records breached. The reported main cause of the known healthcare data breaches in 2016 was unauthorized access/disclosure. Most could have been avoided by the effective use of data encryption technology, as part of a comprehensive information security and privacy management program.

Additionally, ransomware accounted for 72% of healthcare malware attacks in 2016; these attacks usually resulted in EHR downtime. Ransomware attacks rose 250% in 2017. Ransomware recovery costs can exceed $10M per covered entity, with daily downtime costs running over $8,500 per hour of downtime. Organizations must understand both the regulatory hurdles and backup/recovery strategies when encountering breaches.

About the Presenter:
Rebecca Herold is CEO and Founder of The Privacy Professor® consultancy she established in 2004, and is Co-Founder and President of SIMBUS, LLC, an information security, privacy, technology & compliance management cloud service for organizations of all sizes, in all industries, in all locations founded in 2014. Rebecca is an entrepreneur with over 25 years of systems engineering, information security, privacy and compliance experience. Rebecca created the information security and privacy department functions at a large multi-national financial and health care organization throughout the 1990s. Rebecca has authored 19 books to date, dozens of book chapters, and hundreds of published articles.

Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.

Join us to see:

Product in action including the new simplified portal for compliance use cases
New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center

In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.

The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.

Dr. Ron Ross, Fellow, National Institute of Standards and Technology
Ron Ross is a Fellow at the National Institute of Standards and Technology. Dr. Ross leads the Federal Information Security Modernization Act (FISMA) Implementation Project, which includes the NIST Risk Management Framework.

Mr. Richard Spires, CEO, Learning Tree International (CIO, DHS, IRA ret.)
Richard Spires is CEO of Learning Tree International. Previously he has served as the U.S. Department of Homeland Security’s (DHS) Chief Information Officer (CIO) and IRS’s CIO. Spires also served as the Vice-Chairman of the Federal Government CIO Council and the Co-Chairman of the Committee for National Security Systems (CNSS).

Massive data breaches are a dime a dozen these days, affecting more people that before and exposing the highly personal information of millions of consumers. Uber is the latest company to disclose a major breach, joining Equifax from a few months ago, in which the names, addresses and other personal data got stolen by hackers.

Join this interactive Q&A panel discussion to learn more about:
- Impact and lessons learned from the Uber breach
- What should enterprises do to better protect their customer data?
- How can we address the growing threat of cyber attacks?

Some of the industry's top minds will provide their insights on the impact of the recent breaches on consumers, organizations and policy.

Cyberattacks cost companies over $1 million per day and the video game industry is being targeted more than ever. The global audience is huge and growing across demographics. The number of platforms, from personal computers, consoles and hand-helds to smartphones and tablets, makes a smorgasbord of vulnerable users.

And then the bad guys get to work. Accounts are hacked to rip off virtual items your users have invested time and money on, and real-world identification and financial information is harvested for sale. All told, DoS attacks piss off users and drop game income, and more.

Game publishers and developers are the ones who end up shouldering the blame, taking massive financial and reputational hits. But there are increasingly sophisticated ways to lock out the hackers, keep your users safe, and your intellectual property secure.

Join this VB Live event to learn from digital security experts about the four key perimeters of defense, how to proactively secure your environment, and protect against the increasing number of hacks, DDoS attacks, and more.

As more of our business data will exist in the cloud and as the scale of IoT creates more weak links in the security chain, what systems in the network are designed securely that CIOs and CSOs can leverage? And will a lack of industry standards and technology architecture around the IoT makes it difficult to create security policies? Also, why do some contend that the IoT is impossible to secure?

On this edition of NMGs podcast series, we invite Gee Rittenhouse, Senior Vice President, Security Business Group at Cisco and Mike Iwanoff, SVP/CISO/CIO at iconectiv.

Key takeaways for listeners:

a.Fraudsters are out in full force: Yesterday’s solution might not solve tomorrow’s problems/challenges

b.Tips and Info: Top three things I can do to get more info/more data and improve my posture in this area
•Threat Modeling
•Risk Assessment
•Risk Framework

c.Determine whether you have the technology requirements for an acceptable risk posture:
•Multi-cloud security
•Visibility
•segmentation of the network
•automation – allowing you to implement controls to recover from a threat, find the source and mitigate the threat from reoccurring.

d.Communicate that risk posture to exec team and to the board - At the end, the company should know what their risks are and what
they are willing to accept

e.Understand the challenge and know that you don’t have to build your own security solutions.

Uber recently disclosed a massive data breach in which the personal information of 57 million Uber customers and drivers were stolen by hackers in October 2016. What are some of the lessons we can draw from this latest breach?

Join this interactive panel of experts as they review:
- What is the impact of this breach?
- What should Uber users do in response to this breach?
- What are the most common reasons for breaches?
- What should organizations be doing to better tighten their security?

This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.